An overview of power analysis attacks against field programmable gate arrays

OX Standaert, E Peeters, G Rouvroy… - Proceedings of the …, 2006 - ieeexplore.ieee.org
Since their introduction by Kocher in 1998, power analysis attacks have attracted significant
attention within the cryptographic community. While early works in the field mainly …

A primer on hardware security: Models, methods, and metrics

M Rostami, F Koushanfar, R Karri - Proceedings of the IEEE, 2014 - ieeexplore.ieee.org
The multinational, distributed, and multistep nature of integrated circuit (IC) production
supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware …

A tutorial on physical security and side-channel attacks

F Koeune, FX Standaert - International School on Foundations of Security …, 2004 - Springer
A recent branch of cryptography focuses on the physical constraints that a real-life
cryptographic device must face, and attempts to exploit these constraints (running time …

Introduction to differential power analysis

P Kocher, J Jaffe, B Jun, P Rohatgi - Journal of Cryptographic Engineering, 2011 - Springer
The power consumed by a circuit varies according to the activity of its individual transistors
and other components. As a result, measurements of the power used by actual computers or …

The side-channel metrics cheat sheet

K Papagiannopoulos, O Glamočanin… - ACM Computing …, 2023 - dl.acm.org
Side-channel attacks exploit a physical observable originating from a cryptographic device
in order to extract its secrets. Many practically relevant advances in the field of side-channel …

Simulation models for side-channel information leaks

K Tiri, I Verbauwhede - Proceedings of the 42nd annual Design …, 2005 - dl.acm.org
Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to so-called
side-channel attacks (SCAs). The attacker can gain information by monitoring the power …

Design method for constant power consumption of differential logic circuits

K Tiri, I Verbauwhede - Design, Automation and Test in Europe, 2005 - ieeexplore.ieee.org
Side channel attacks are a major security concern for smart cards and other embedded
devices. They analyze the variations of the power consumption to find the secret key of the …

Securing AES designs against power analysis attacks: a survey

TB Singha, RP Palathinkal… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the advent of Internet of Things (IoT), the call for hardware security has been seriously
demanding due to the risks of side-channel attacks from adversaries. Advanced encryption …

A design flow and evaluation framework for DPA-resistant instruction set extensions

F Regazzoni, A Cevrero, FX Standaert, S Badel… - … and Embedded Systems …, 2009 - Springer
Power-based side channel attacks are a significant security risk, especially for embedded
applications. To improve the security of such devices, protected logic styles have been …

Information theoretic evaluation of side-channel resistant logic styles

F Macé, FX Standaert, JJ Quisquater - Cryptographic Hardware and …, 2007 - Springer
We propose to apply an information theoretic metric to the evaluation of side-channel
resistant logic styles. Due to the long design and development time required for the physical …